Chicago IT Support Blog

What is two-factor authentication (and why should you care)?

Posted by Steven Thom on Mar 26, 2017 8:18:11 PM

Much has been said in recent stories about two-factor authentication (also known as "2FA"), with Instagram, Nest, Apple, Ebay, and many others making it available on their respective websites. A solution that sounded nerdy as recently as a few years ago is starting to sound almost mandatory for average folks. So what is two-factor authentication and why should you care?

Read More

Topics: breach, Business Continuity, cardholder data environment, catastrophic data loss, chicago computer support, chicago IT support, disaster preparedness, disclosure, hacker, PCI, Security, threat, vulnerability

Should you be worried about the latest Yahoo security breach?

Posted by Steven Thom on Mar 21, 2017 2:59:49 PM

Yahoo email has experienced yet another security breach by hackers. Should you be worried about this? Even if you do not currently have a Yahoo email address, it is my opinion that you still need to be concerned.

Read More

Topics: breach, Business, cardholder data environment, chicago computer support, chicago IT support, Chicago PC Support, Disaster Recovery, ePHI, exploit, hacker, Healthcare IT, Hipaa, Hippa, infection, malware, security, threat, vulnerability

It May Be Time to Outsource Your Computer Support

Posted by Steven Thom on Mar 19, 2017 2:25:58 PM
Is it Time to Outsource Your Computer Support? Many businesses are beginning to reach that conclusion.

"prevention is better than cure"

-Erasmus

Setting up a small business computer network used to be a relatively simple affair. A small business owner merely needed a few computers, an internet connection with a cable or DSL modem, some cable connections, and the job was essentially done. The situation has changed dramatically in recent years, with proliferation of threats such as:

  • Viruses
  • Malware
  • Ransomware
  • Password stealing Trojans
  • Spearfishing attacks
Read More

Topics: 0-day, antivirus, breach, business continuity planning, cardholder data environment, catastrophic data loss, chicago computer support, chicago IT support, Chicago PC Support, Disaster Recovery, exploit, hacker, Healthcare IT, Hipaa, Hippa, malware, medical, patch, PCI, PHI, privacy, Security, virus, viruses, vulnerability, zero-day, natural disaster

Lessons learned from the Target PCI Breach

Posted by Steven Thom on Feb 15, 2014 1:51:31 PM

More information has been trickling out regarding the massive Target PCI breach that took place during the 2013 Christmas shopping season. Forensic researchers first learned that hackers penetrated Target's network by means of a business transaction portal. It appears that Fazio Mechanical Services was the source. Fazio is a Pittsburgh-area nationwide mechanical contractor that services many large retailers. Now more details are emerging about the mechanism hackers used to infect the HVAC contractor. There are serious lessons here that businesses of all sizes need to learn. It's safe to say the face of PCI compliance will forever be changed as a result of the findings.

Read More

Topics: 0day, breach, business continuity, cardholder data environment, chicago computer support, chicago IT support, Chicago PC Support, disclosure, exploit, firefox, firewall, hacker, homeland security, internet, internet explorer, java, Mac, malware, PCI, privacy, security, Security, software, update, virus, vulnerability, zero-day

Defend Against the CryptoLocker Virus

Posted by Steven Thom on Nov 16, 2013 7:39:06 PM

The "CryptoLocker" virus has been making a great deal of noise lately. Though we at Thom Infotech have not personally encountered it, we know others who have. We've written this post to help you to understand and defend against the CryptoLocker virus.

Read More

Topics: 0day, adobe, breach, business continuity, Business Continuity, catastrophic data loss, chicago computer support, chicago IT support, Chicago PC Support, cryptolocker, disaster, disclosure, email, encrypt, encryption, ePHI, exploit, explorer, facebook, firefox, firewall, flash, google, hacker, Hipaa, Hippa, homeland security, infection, internet, internet explorer, java, malware, microsoft, oracle, patch, privacy, security, Security, software, update, UTM, virus, viruses, vulnerability, zero-day

179 Reasons to Upgrade Before January 2014

Posted by Steven Thom on Nov 15, 2013 1:06:06 PM

As of this writing there are roughly four useble business weeks left in the current year.  As 2013 winds down, businesses should consider performing needed upgrades sooner rather than later. At the risk of creating a lengthy blog post I'm planning to provide 179 reasons to upgrade before January 2014.

Read More

Topics: business continuity, Business Continuity, chicago computer support, chicago IT support, Chicago PC Support, exploit, firewall, Healthcare IT, Hipaa, Hippa, homeland security, internet, internet explorer, java, malware, microsoft, patch, Section 179, security, Security, software, update, virus, viruses, vulnerability, zero-day

WordPress now offers automatic updates

Posted by Steven Thom on Oct 31, 2013 6:37:41 PM

There is welcome news for web developers this week as WordPress now offers automatic updates to the uber-popular web development platform. Starting out as a blogging tool, WordPress has morphed into a full website development ecosystem. Like many, this author has embraced WordPress due to its simplicity, flexibility, and easy search engine optimization.

Read More

Topics: 0day, adobe, Apple, breach, chicago computer support, chicago IT support, Chicago PC Support, disclosure, email, exploit, firefox, firewall, flash, hacker, Hipaa, homeland security, internet, internet explorer, java, Mac, malware, microsoft, oracle, privacy, security, Security, software, threat, unpatched, update, virus, viruses, vulnerability, Wordpress, zero-day

August 2013 Microsoft Patch Tuesday is Here

Posted by Steven Thom on Aug 13, 2013 2:28:03 PM

It's the second Tuesday of the month, so that means it's Patch Tuesday. Microsoft will begin rolling out patches as the day progresses. This means your computer will likely reboot overnight. Here's a rundown of the patches you can expect.

Read More

Topics: 0day, breach, Chicago PC Support, disclosure, EHR, EMR, Healthcare IT, Hipaa, internet explorer, malware, microsoft, patch, Security, vulnerability, zero-day

Trendjacking threats are a growing concern

Posted by Steven Thom on Aug 9, 2013 5:20:25 PM

I'm sure you've seen this, and I hope you haven't fallen for it. Nevertheless, it must work because the bad guys keep doing it. The term is "Trendjacking", and it refers to spammers and malware authors using current trends to trick you into opening malicious email messages.

Read More

Topics: 0day, adobe, breach, chicago computer support, chicago IT support, Chicago PC Support, email, exploit, facebook, google, hacker, homeland security, internet, internet explorer, java, malware, microsoft, patch, security, Security, trendjacking, update, virus, viruses, vulnerability, zero-day

Idaho State University fined $400,000 for skipping HIPAA Security Risk Analysis

Posted by Steven Thom on Jun 18, 2013 8:43:35 AM

Skipped HIPAA Security Risk Analysis costs ISU $400,000

Read More

Topics: breach, chicago computer support, chicago IT support, disclosure, EHR, EMR, ePHI, firewall, Healthcare IT, Hipaa, Hippa, medical, PHI, security, vulnerability

Need Help Now? Click Here!

Chicago IT Support

Great IT support for the Chicago area and beyond

Thom Infotech has been providing quality IT support for the Chicago area and beyond since 2000. We deliver proactive IT services that improve security and reliability. Our flexible pricing plans make it possible for small to medium businesses to leverage enterprise-grade solutions for security and business continuity.

Contact us for:

Subscribe to Email Updates

Posts by Topic

see all
Real Time Web Analytics